1 // -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
2 // vim: ts=8 sw=2 smarttab ft=cpp
4 #include "rgw_common.h"
5 #include "rgw_rest_client.h"
6 #include "rgw_auth_s3.h"
7 #include "rgw_http_errors.h"
10 #include "common/armor.h"
11 #include "common/strtol.h"
12 #include "include/str_list.h"
13 #include "rgw_crypt_sanitize.h"
15 #define dout_context g_ceph_context
16 #define dout_subsys ceph_subsys_rgw
18 int RGWHTTPSimpleRequest::get_status()
20 int retcode
= get_req_retcode();
27 int RGWHTTPSimpleRequest::handle_header(const string
& name
, const string
& val
)
29 if (name
== "CONTENT_LENGTH") {
31 long len
= strict_strtol(val
.c_str(), 10, &err
);
33 ldout(cct
, 0) << "ERROR: failed converting content length (" << val
<< ") to int " << dendl
;
43 int RGWHTTPSimpleRequest::receive_header(void *ptr
, size_t len
)
45 unique_lock
guard(out_headers_lock
);
49 char *s
= (char *)ptr
, *end
= (char *)ptr
+ len
;
51 ldout(cct
, 10) << "receive_http_header" << dendl
;
60 ldout(cct
, 10) << "received header:" << line
<< dendl
;
61 // TODO: fill whatever data required here
63 char *tok
= strsep(&l
, " \t:");
68 if (strcmp(tok
, "HTTP") == 0 || strncmp(tok
, "HTTP/", 5) == 0) {
69 http_status
= atoi(l
);
70 if (http_status
== 100) /* 100-continue response */
72 status
= rgw_http_error_to_errno(http_status
);
74 /* convert header field name to upper case */
78 for (i
= 0; i
< len
&& *src
; ++i
, ++src
) {
84 buf
[i
] = toupper(*src
);
89 int r
= handle_header(buf
, l
);
101 static void get_new_date_str(string
& date_str
)
103 date_str
= rgw_to_asctime(ceph_clock_now());
106 static void get_gmt_date_str(string
& date_str
)
108 auto now_time
= ceph::real_clock::now();
109 time_t rawtime
= ceph::real_clock::to_time_t(now_time
);
114 gmtime_r(&rawtime
, &timeInfo
);
115 strftime(buffer
, sizeof(buffer
), "%a, %d %b %Y %H:%M:%S %z", &timeInfo
);
120 int RGWRESTSimpleRequest::execute(RGWAccessKey
& key
, const char *_method
, const char *resource
)
123 string new_url
= url
;
124 string new_resource
= resource
;
126 if (new_url
[new_url
.size() - 1] == '/' && resource
[0] == '/') {
127 new_url
= new_url
.substr(0, new_url
.size() - 1);
128 } else if (resource
[0] != '/') {
130 new_resource
.append(resource
);
132 new_url
.append(new_resource
);
136 get_new_date_str(date_str
);
137 headers
.push_back(pair
<string
, string
>("HTTP_DATE", date_str
));
139 string canonical_header
;
141 map
<string
, string
> sub_resources
;
143 rgw_create_s3_canonical_header(method
.c_str(), NULL
, NULL
, date_str
.c_str(),
144 meta_map
, meta_map
, url
.c_str(), sub_resources
,
149 digest
= rgw::auth::s3::get_v2_signature(cct
, key
.key
, canonical_header
);
154 string auth_hdr
= "AWS " + key
.id
+ ":" + digest
;
156 ldout(cct
, 15) << "generated auth header: " << auth_hdr
<< dendl
;
158 headers
.push_back(pair
<string
, string
>("AUTHORIZATION", auth_hdr
));
159 int r
= process(null_yield
);
166 int RGWHTTPSimpleRequest::send_data(void *ptr
, size_t len
, bool* pause
)
171 if (len
> send_iter
->get_remaining())
172 len
= send_iter
->get_remaining();
174 send_iter
->copy(len
, (char *)ptr
);
179 int RGWHTTPSimpleRequest::receive_data(void *ptr
, size_t len
, bool *pause
)
181 size_t cp_len
, left_len
;
183 left_len
= max_response
> response
.length() ? (max_response
- response
.length()) : 0;
185 return 0; /* don't read extra data */
187 cp_len
= (len
> left_len
) ? left_len
: len
;
188 bufferptr
p((char *)ptr
, cp_len
);
195 static void append_param(string
& dest
, const string
& name
, const string
& val
)
203 url_encode(name
, url_name
);
204 dest
.append(url_name
);
208 url_encode(val
, url_val
);
210 dest
.append(url_val
);
214 static void do_get_params_str(const param_vec_t
& params
, map
<string
, string
>& extra_args
, string
& dest
)
216 map
<string
, string
>::iterator miter
;
217 for (miter
= extra_args
.begin(); miter
!= extra_args
.end(); ++miter
) {
218 append_param(dest
, miter
->first
, miter
->second
);
220 for (auto iter
= params
.begin(); iter
!= params
.end(); ++iter
) {
221 append_param(dest
, iter
->first
, iter
->second
);
225 void RGWHTTPSimpleRequest::get_params_str(map
<string
, string
>& extra_args
, string
& dest
)
227 do_get_params_str(params
, extra_args
, dest
);
230 void RGWHTTPSimpleRequest::get_out_headers(map
<string
, string
> *pheaders
)
232 unique_lock
guard(out_headers_lock
);
233 pheaders
->swap(out_headers
);
237 static int sign_request(CephContext
*cct
, RGWAccessKey
& key
, RGWEnv
& env
, req_info
& info
)
239 /* don't sign if no key is provided */
240 if (key
.key
.empty()) {
244 if (cct
->_conf
->subsys
.should_gather
<ceph_subsys_rgw
, 20>()) {
245 for (const auto& i
: env
.get_map()) {
246 ldout(cct
, 20) << "> " << i
.first
<< " -> " << rgw::crypt_sanitize::x_meta_map
{i
.first
, i
.second
} << dendl
;
250 string canonical_header
;
251 if (!rgw_create_s3_canonical_header(info
, NULL
, canonical_header
, false)) {
252 ldout(cct
, 0) << "failed to create canonical s3 header" << dendl
;
256 ldout(cct
, 10) << "generated canonical header: " << canonical_header
<< dendl
;
260 digest
= rgw::auth::s3::get_v2_signature(cct
, key
.key
, canonical_header
);
265 string auth_hdr
= "AWS " + key
.id
+ ":" + digest
;
266 ldout(cct
, 15) << "generated auth header: " << auth_hdr
<< dendl
;
268 env
.set("AUTHORIZATION", auth_hdr
);
273 int RGWRESTSimpleRequest::forward_request(RGWAccessKey
& key
, req_info
& info
, size_t max_response
, bufferlist
*inbl
, bufferlist
*outbl
)
277 get_new_date_str(date_str
);
280 req_info
new_info(cct
, &new_env
);
281 new_info
.rebuild_from(info
);
282 string bucket_encode
;
283 string request_uri_encode
;
284 size_t pos
= new_info
.request_uri
.substr(1, new_info
.request_uri
.size() - 1).find("/");
285 string bucket
= new_info
.request_uri
.substr(1, pos
);
286 url_encode(bucket
, bucket_encode
);
287 if (std::string::npos
!= pos
)
288 request_uri_encode
= string("/") + bucket_encode
+ new_info
.request_uri
.substr(pos
+ 1);
290 request_uri_encode
= string("/") + bucket_encode
;
291 new_info
.request_uri
= request_uri_encode
;
292 new_env
.set("HTTP_DATE", date_str
.c_str());
293 const char* const content_md5
= info
.env
->get("HTTP_CONTENT_MD5");
295 new_env
.set("HTTP_CONTENT_MD5", content_md5
);
297 int ret
= sign_request(cct
, key
, new_env
, new_info
);
299 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
303 for (const auto& kv
: new_env
.get_map()) {
304 headers
.emplace_back(kv
);
307 meta_map_t
& meta_map
= new_info
.x_meta_map
;
308 for (const auto& kv
: meta_map
) {
309 headers
.emplace_back(kv
);
313 get_params_str(info
.args
.get_params(), params_str
);
315 string new_url
= url
;
316 string
& resource
= new_info
.request_uri
;
317 string new_resource
= resource
;
318 if (new_url
[new_url
.size() - 1] == '/' && resource
[0] == '/') {
319 new_url
= new_url
.substr(0, new_url
.size() - 1);
320 } else if (resource
[0] != '/') {
322 new_resource
.append(resource
);
324 new_url
.append(new_resource
+ params_str
);
326 bufferlist::iterator bliter
;
329 bliter
= inbl
->begin();
332 set_send_length(inbl
->length());
335 method
= new_info
.method
;
338 int r
= process(null_yield
);
341 // curl_easy has errored, generally means the service is not available
342 r
= -ERR_SERVICE_UNAVAILABLE
;
347 response
.append((char)0); /* NULL terminate response */
350 outbl
->claim(response
);
356 class RGWRESTStreamOutCB
: public RGWGetDataCB
{
357 RGWRESTStreamS3PutObj
*req
;
359 explicit RGWRESTStreamOutCB(RGWRESTStreamS3PutObj
*_req
) : req(_req
) {}
360 int handle_data(bufferlist
& bl
, off_t bl_ofs
, off_t bl_len
) override
; /* callback for object iteration when sending data */
363 int RGWRESTStreamOutCB::handle_data(bufferlist
& bl
, off_t bl_ofs
, off_t bl_len
)
365 dout(20) << "RGWRESTStreamOutCB::handle_data bl.length()=" << bl
.length() << " bl_ofs=" << bl_ofs
<< " bl_len=" << bl_len
<< dendl
;
366 if (!bl_ofs
&& bl_len
== bl
.length()) {
367 req
->add_send_data(bl
);
371 bufferptr
bp(bl
.c_str() + bl_ofs
, bl_len
);
373 new_bl
.push_back(bp
);
375 req
->add_send_data(new_bl
);
379 RGWRESTStreamS3PutObj::~RGWRESTStreamS3PutObj()
384 static void grants_by_type_add_one_grant(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
)
386 string
& s
= grants_by_type
[perm
];
392 ACLGranteeType
& type
= grant
.get_type();
393 switch (type
.get_type()) {
397 case ACL_TYPE_EMAIL_USER
:
398 id_type_str
= "emailAddress";
405 s
.append(id_type_str
+ "=\"" + id
.to_str() + "\"");
408 struct grant_type_to_header
{
413 struct grant_type_to_header grants_headers_def
[] = {
414 { RGW_PERM_FULL_CONTROL
, "x-amz-grant-full-control"},
415 { RGW_PERM_READ
, "x-amz-grant-read"},
416 { RGW_PERM_WRITE
, "x-amz-grant-write"},
417 { RGW_PERM_READ_ACP
, "x-amz-grant-read-acp"},
418 { RGW_PERM_WRITE_ACP
, "x-amz-grant-write-acp"},
422 static bool grants_by_type_check_perm(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
, int check_perm
)
424 if ((perm
& check_perm
) == check_perm
) {
425 grants_by_type_add_one_grant(grants_by_type
, check_perm
, grant
);
431 static void grants_by_type_add_perm(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
)
433 struct grant_type_to_header
*t
;
435 for (t
= grants_headers_def
; t
->header
; t
++) {
436 if (grants_by_type_check_perm(grants_by_type
, perm
, grant
, t
->type
))
441 static void add_grants_headers(map
<int, string
>& grants
, RGWEnv
& env
, meta_map_t
& meta_map
)
443 struct grant_type_to_header
*t
;
445 for (t
= grants_headers_def
; t
->header
; t
++) {
446 map
<int, string
>::iterator iter
= grants
.find(t
->type
);
447 if (iter
!= grants
.end()) {
448 env
.set(t
->header
,iter
->second
);
449 meta_map
[t
->header
] = iter
->second
;
454 void RGWRESTGenerateHTTPHeaders::init(const string
& _method
, const string
& _url
, const string
& resource
, const param_vec_t
& params
)
457 map
<string
, string
>& args
= new_info
->args
.get_params();
458 do_get_params_str(params
, args
, params_str
);
460 /* merge params with extra args so that we can sign correctly */
461 for (auto iter
= params
.begin(); iter
!= params
.end(); ++iter
) {
462 new_info
->args
.append(iter
->first
, iter
->second
);
465 url
= _url
+ resource
+ params_str
;
468 get_gmt_date_str(date_str
);
470 new_env
->set("HTTP_DATE", date_str
.c_str());
473 new_info
->method
= method
.c_str();
475 new_info
->script_uri
= "/";
476 new_info
->script_uri
.append(resource
);
477 new_info
->request_uri
= new_info
->script_uri
;
480 static bool is_x_amz(const string
& s
) {
481 return boost::algorithm::starts_with(s
, "x-amz-");
484 void RGWRESTGenerateHTTPHeaders::set_extra_headers(const map
<string
, string
>& extra_headers
)
486 for (auto iter
: extra_headers
) {
487 const string
& name
= lowercase_dash_http_attr(iter
.first
);
488 new_env
->set(name
, iter
.second
.c_str());
489 if (is_x_amz(name
)) {
490 new_info
->x_meta_map
[name
] = iter
.second
;
495 int RGWRESTGenerateHTTPHeaders::set_obj_attrs(map
<string
, bufferlist
>& rgw_attrs
)
497 map
<string
, string
> new_attrs
;
499 /* merge send headers */
500 for (auto& attr
: rgw_attrs
) {
501 bufferlist
& bl
= attr
.second
;
502 const string
& name
= attr
.first
;
503 string val
= bl
.c_str();
504 if (name
.compare(0, sizeof(RGW_ATTR_META_PREFIX
) - 1, RGW_ATTR_META_PREFIX
) == 0) {
505 string header_name
= RGW_AMZ_META_PREFIX
;
506 header_name
.append(name
.substr(sizeof(RGW_ATTR_META_PREFIX
) - 1));
507 new_attrs
[header_name
] = val
;
511 RGWAccessControlPolicy policy
;
512 int ret
= rgw_policy_from_attrset(cct
, rgw_attrs
, &policy
);
514 ldout(cct
, 0) << "ERROR: couldn't get policy ret=" << ret
<< dendl
;
518 set_http_attrs(new_attrs
);
524 static std::set
<string
> keep_headers
= { "content-type",
526 "content-disposition",
527 "content-language" };
529 void RGWRESTGenerateHTTPHeaders::set_http_attrs(const map
<string
, string
>& http_attrs
)
531 /* merge send headers */
532 for (auto& attr
: http_attrs
) {
533 const string
& val
= attr
.second
;
534 const string
& name
= lowercase_dash_http_attr(attr
.first
);
535 if (is_x_amz(name
)) {
536 new_env
->set(name
, val
);
537 new_info
->x_meta_map
[name
] = val
;
539 new_env
->set(attr
.first
, val
); /* Ugh, using the uppercase representation,
540 as the signing function calls info.env.get("CONTENT_TYPE").
541 This needs to be cleaned up! */
546 void RGWRESTGenerateHTTPHeaders::set_policy(RGWAccessControlPolicy
& policy
)
548 /* update acl headers */
549 RGWAccessControlList
& acl
= policy
.get_acl();
550 multimap
<string
, ACLGrant
>& grant_map
= acl
.get_grant_map();
551 multimap
<string
, ACLGrant
>::iterator giter
;
552 map
<int, string
> grants_by_type
;
553 for (giter
= grant_map
.begin(); giter
!= grant_map
.end(); ++giter
) {
554 ACLGrant
& grant
= giter
->second
;
555 ACLPermission
& perm
= grant
.get_permission();
556 grants_by_type_add_perm(grants_by_type
, perm
.get_permissions(), grant
);
558 add_grants_headers(grants_by_type
, *new_env
, new_info
->x_meta_map
);
561 int RGWRESTGenerateHTTPHeaders::sign(RGWAccessKey
& key
)
563 int ret
= sign_request(cct
, key
, *new_env
, *new_info
);
565 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
572 void RGWRESTStreamS3PutObj::send_init(rgw_obj
& obj
)
576 string new_url
= url
;
578 if (host_style
== VirtualStyle
) {
579 resource_str
= obj
.get_oid();
580 new_url
= obj
.bucket
.name
+ "." + new_url
;
582 resource_str
= obj
.bucket
.name
+ "/" + obj
.get_oid();
585 //do not encode slash in object key name
586 url_encode(resource_str
, resource
, false);
588 if (new_url
[new_url
.size() - 1] != '/')
592 headers_gen
.init(method
, new_url
, resource
, params
);
594 url
= headers_gen
.get_url();
597 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, map
<string
, bufferlist
>& rgw_attrs
, bool send
)
599 headers_gen
.set_obj_attrs(rgw_attrs
);
601 return send_ready(key
, send
);
604 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, const map
<string
, string
>& http_attrs
,
605 RGWAccessControlPolicy
& policy
, bool send
)
607 headers_gen
.set_http_attrs(http_attrs
);
608 headers_gen
.set_policy(policy
);
610 return send_ready(key
, send
);
613 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, bool send
)
615 headers_gen
.sign(key
);
617 for (const auto& kv
: new_env
.get_map()) {
618 headers
.emplace_back(kv
);
621 out_cb
= new RGWRESTStreamOutCB(this);
624 int r
= RGWHTTP::send(this);
632 int RGWRESTStreamS3PutObj::put_obj_init(RGWAccessKey
& key
, rgw_obj
& obj
, uint64_t obj_size
, map
<string
, bufferlist
>& attrs
, bool send
)
635 return send_ready(key
, attrs
, send
);
638 void set_str_from_headers(map
<string
, string
>& out_headers
, const string
& header_name
, string
& str
)
640 map
<string
, string
>::iterator iter
= out_headers
.find(header_name
);
641 if (iter
!= out_headers
.end()) {
648 static int parse_rgwx_mtime(CephContext
*cct
, const string
& s
, ceph::real_time
*rt
)
653 get_str_vec(s
, ".", vec
);
659 long secs
= strict_strtol(vec
[0].c_str(), 10, &err
);
662 ldout(cct
, 0) << "ERROR: failed converting mtime (" << s
<< ") to real_time " << dendl
;
666 if (vec
.size() > 1) {
667 nsecs
= strict_strtol(vec
[1].c_str(), 10, &err
);
669 ldout(cct
, 0) << "ERROR: failed converting mtime (" << s
<< ") to real_time " << dendl
;
674 *rt
= utime_t(secs
, nsecs
).to_real_time();
679 static void send_prepare_convert(const rgw_obj
& obj
, string
*resource
)
681 string urlsafe_bucket
, urlsafe_object
;
682 url_encode(obj
.bucket
.get_key(':', 0), urlsafe_bucket
);
683 url_encode(obj
.key
.name
, urlsafe_object
);
684 *resource
= urlsafe_bucket
+ "/" + urlsafe_object
;
687 int RGWRESTStreamRWRequest::send_request(RGWAccessKey
& key
, map
<string
, string
>& extra_headers
, const rgw_obj
& obj
, RGWHTTPManager
*mgr
)
690 send_prepare_convert(obj
, &resource
);
692 return send_request(&key
, extra_headers
, resource
, mgr
);
695 int RGWRESTStreamRWRequest::send_prepare(RGWAccessKey
& key
, map
<string
, string
>& extra_headers
, const rgw_obj
& obj
)
698 send_prepare_convert(obj
, &resource
);
700 return do_send_prepare(&key
, extra_headers
, resource
);
703 int RGWRESTStreamRWRequest::send_prepare(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
704 bufferlist
*send_data
)
707 //do not encode slash
708 url_encode(resource
, new_resource
, false);
710 return do_send_prepare(key
, extra_headers
, new_resource
, send_data
);
713 int RGWRESTStreamRWRequest::do_send_prepare(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
714 bufferlist
*send_data
)
716 string new_url
= url
;
717 if (!new_url
.empty() && new_url
.back() != '/')
721 req_info
new_info(cct
, &new_env
);
725 string old_resource
= resource
;
727 if (resource
[0] == '/') {
728 new_resource
= resource
.substr(1);
730 new_resource
= resource
;
733 size_t pos
= new_resource
.find("/");
734 bucket_name
= new_resource
.substr(0, pos
);
736 //when dest is a bucket with out other params, uri should end up with '/'
737 if(pos
== string::npos
&& params
.size() == 0 && host_style
== VirtualStyle
) {
738 new_resource
.append("/");
741 if (host_style
== VirtualStyle
) {
742 new_url
= bucket_name
+ "." + new_url
;
743 if(pos
== string::npos
) {
746 new_resource
= new_resource
.substr(pos
+1);
750 RGWRESTGenerateHTTPHeaders
headers_gen(cct
, &new_env
, &new_info
);
752 headers_gen
.init(method
, new_url
, new_resource
, params
);
754 headers_gen
.set_http_attrs(extra_headers
);
758 new_info
.init_meta_info(nullptr);
761 int ret
= headers_gen
.sign(*key
);
763 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
768 for (const auto& kv
: new_env
.get_map()) {
769 headers
.emplace_back(kv
);
773 set_send_length(send_data
->length());
774 set_outbl(*send_data
);
775 set_send_data_hint(true);
779 method
= new_info
.method
;
780 url
= headers_gen
.get_url();
785 int RGWRESTStreamRWRequest::send_request(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
786 RGWHTTPManager
*mgr
, bufferlist
*send_data
)
788 int ret
= send_prepare(key
, extra_headers
, resource
, send_data
);
797 int RGWRESTStreamRWRequest::send(RGWHTTPManager
*mgr
)
800 return RGWHTTP::send(this);
803 int r
= mgr
->add_request(this);
810 int RGWRESTStreamRWRequest::complete_request(string
*etag
,
813 map
<string
, string
> *pattrs
,
814 map
<string
, string
> *pheaders
)
816 int ret
= wait(null_yield
);
821 unique_lock
guard(out_headers_lock
);
824 set_str_from_headers(out_headers
, "ETAG", *etag
);
829 set_str_from_headers(out_headers
, "RGWX_MTIME", mtime_str
);
830 if (!mtime_str
.empty()) {
831 int ret
= parse_rgwx_mtime(cct
, mtime_str
, mtime
);
836 *mtime
= real_time();
841 set_str_from_headers(out_headers
, "RGWX_OBJECT_SIZE", size_str
);
843 *psize
= strict_strtoll(size_str
.c_str(), 10, &err
);
845 ldout(cct
, 0) << "ERROR: failed parsing embedded metadata object size (" << size_str
<< ") to int " << dendl
;
851 for (auto iter
= out_headers
.begin(); pattrs
&& iter
!= out_headers
.end(); ++iter
) {
852 const string
& attr_name
= iter
->first
;
853 if (attr_name
.compare(0, sizeof(RGW_HTTP_RGWX_ATTR_PREFIX
) - 1, RGW_HTTP_RGWX_ATTR_PREFIX
) == 0) {
854 string name
= attr_name
.substr(sizeof(RGW_HTTP_RGWX_ATTR_PREFIX
) - 1);
855 const char *src
= name
.c_str();
856 char buf
[name
.size() + 1];
858 for (; *src
; ++src
, ++dest
) {
864 *dest
= tolower(*src
);
868 (*pattrs
)[buf
] = iter
->second
;
873 *pheaders
= std::move(out_headers
);
878 int RGWHTTPStreamRWRequest::handle_header(const string
& name
, const string
& val
)
880 if (name
== "RGWX_EMBEDDED_METADATA_LEN") {
882 long len
= strict_strtol(val
.c_str(), 10, &err
);
884 ldout(cct
, 0) << "ERROR: failed converting embedded metadata len (" << val
<< ") to int " << dendl
;
888 cb
->set_extra_data_len(len
);
893 int RGWHTTPStreamRWRequest::receive_data(void *ptr
, size_t len
, bool *pause
)
895 size_t orig_len
= len
;
898 in_data
.append((const char *)ptr
, len
);
900 size_t orig_in_data_len
= in_data
.length();
902 int ret
= cb
->handle_data(in_data
, pause
);
909 ceph_assert(in_data
.length() <= orig_in_data_len
);
912 size_t left_to_read
= orig_in_data_len
- len
;
913 if (in_data
.length() > left_to_read
) {
914 in_data
.splice(0, in_data
.length() - left_to_read
, &bl
);
922 void RGWHTTPStreamRWRequest::set_stream_write(bool s
) {
923 std::lock_guard wl
{write_lock
};
927 void RGWHTTPStreamRWRequest::unpause_receive()
929 std::lock_guard req_locker
{get_req_lock()};
931 _set_read_paused(false);
935 void RGWHTTPStreamRWRequest::add_send_data(bufferlist
& bl
)
937 std::scoped_lock locker
{get_req_lock(), write_lock
};
938 outbl
.claim_append(bl
);
939 _set_write_paused(false);
942 uint64_t RGWHTTPStreamRWRequest::get_pending_send_size()
944 std::lock_guard wl
{write_lock
};
945 return outbl
.length();
948 void RGWHTTPStreamRWRequest::finish_write()
950 std::scoped_lock locker
{get_req_lock(), write_lock
};
951 write_stream_complete
= true;
952 _set_write_paused(false);
955 int RGWHTTPStreamRWRequest::send_data(void *ptr
, size_t len
, bool *pause
)
960 std::lock_guard wl
{write_lock
};
962 if (outbl
.length() == 0) {
963 if ((stream_writes
&& !write_stream_complete
) ||
964 (write_ofs
< send_len
)) {
970 len
= std::min(len
, (size_t)outbl
.length());
973 outbl
.splice(0, len
, &bl
);
974 send_size
= bl
.length();
976 memcpy(ptr
, bl
.c_str(), send_size
);
977 write_ofs
+= send_size
;
980 out_len
= outbl
.length();
982 /* don't need to be under write_lock here, avoid deadlocks in case notify callback
984 if (write_drain_cb
) {
985 write_drain_cb
->notify(out_len
);
990 class StreamIntoBufferlist
: public RGWGetDataCB
{
993 explicit StreamIntoBufferlist(bufferlist
& _bl
) : bl(_bl
) {}
994 int handle_data(bufferlist
& inbl
, off_t bl_ofs
, off_t bl_len
) override
{
995 bl
.claim_append(inbl
);